of September 28, 2018
About state cooperation – members of the Commonwealth of Independent States in fight against crimes in the field of information technologies
The State Parties of the Commonwealth of Independent States which further are referred to as with the Parties
for the purpose of ensuring effective fight against crimes in the field of information technologies,
being convinced that coordinated actions of the Parties in fight against crimes in the field of information technologies are the imperative need,
aiming to create the legal basis of cooperation of law enforcement agencies of the Parties in fight against crimes in the field of information technologies,
agreed as follows:
For the purposes of this agreement the concepts used in it mean:
malicious application – the created or existing program with specially made changes which is obviously leading to unauthorized destruction, blocking, modification or copying of information, violation of work of information (computer) system;
information technologies? set of the methods, production processes and program technical means united in the technological complex providing collection, creation, storage, accumulating, processing, search, conclusion, copying, transfer, distribution and information security;
information system – organizationally the arranged set of the means realizing certain technological actions by means of the information processes intended for the solution of specific functional objectives;
computer system – complex of the equipment rooms and software intended for the automated collection, storage, processing, transfer and receipt of information;
computer information – information which is in memory of computer system, on machine or on other carriers in shape, computer system available to perception, or transferred on communication channels;
unauthorized information access – access to the protected information with violation of the rights or rules established by its owner, the owner and (or) the legislation of the Parties.
1. The parties according to this agreement, the national legal system and international treaties which participants they are cooperate for the purpose of providing the prevention, identification, suppression, disclosure and investigation of crimes in the field of information technologies.
2. The parties take necessary organizational and legal measures for accomplishment of provisions of this agreement.
3. The parties aim at rapprochement of national legal systems in the field of fight against crimes in the field of information technologies.
1. The parties recognize according to the national legal system as penal the following acts in the field of information technologies if they are made intentionally:
a) destruction, blocking, modification or copying of information, violation of work of information (computer) system by unauthorized access to the computer information protected by the law;
b) creation, use or distribution of malicious applications;
c) abuse of regulations of operation of computer system by person having to it access, the entailed destruction, blocking or modification of the computer information protected by the law if this act did essential harm or heavy effects;
d) plunder of property by change of information processed in the computer system which is stored on machine carriers or transferred on data transmission networks, or by introduction in computer system of false information, or integrated to unauthorized access to the computer information protected by the law;
e) distribution with use of the Internet or other channels of electric communication of pornographic materials or objects of pornographic nature with the image of the minor;
e) production for the purpose of sale or sale special program or hardware of receipt of unauthorized access to the protected computer system or network;
g) illegal use of programs for the computer systems and databases which are copyright objects, and is equal authorship assignment if this act caused essential damage;
h) distribution with use of the Internet or other channels of electric communication of the materials recognized in accordance with the established procedure extremist or containing appeals to implementation of terrorist activities or justification of terrorism.
Disclaimer! This text was translated by AI translator and is not a valid juridical document. No warranty. No claim. More info
Database include more 38000 documents. You can find needed documents using search system. For effective work you can mix any on documents parameters: country, documents type, date range, teams or tags.
If you cannot find the required document, or you do not know where to begin, go to Help section.
In this section, we’ve tried to describe in detail the features and capabilities of the system, as well as the most effective techniques for working with the database.
You also may open the section Frequently asked questions. This section provides answers to questions set by users.